Winning CTFs with Corellium
On Demand

Winning CTFs with Corellium

Discover how Corellium's advanced virtual environments and streamlined workflows are transforming CTF (Capture the Flag) challenges. Watch the latest “Change What’s Possible” episode for expert insights and actionable strategies to elevate your cybersecurity skills.
Using Corellium Virtual Hardware to Develop Software Before and After Silicon
On Demand

Using Corellium Virtual Hardware to Develop Software Before and After Silicon

Watch the latest Change What’s Possible episode featuring Bill Neifert and Jason Yamada to learn how to unlock the power of Corellium’s virtual hardware to accelerate software development before and after silicon.
The Future of Mobile Security: Introducing All New Corellium Product Lines
On Demand

The Future of Mobile Security: Introducing All New Corellium Product Lines

Watch the latest Change What’s Possible episode featuring Brian Robison to learn about our newest and most advanced product lines: Corellium Viper™, Corellium Falcon™, Corellium Solo™, and Corellium MATRIX™.
Revolutionize Mobile Pentesting with Corellium MATRIX™
On Demand

Revolutionize Mobile Pentesting with Corellium MATRIX™

Watch the latest Change What’s Possible episode to dive into our latest groundbreaking technology and see first-hand how Corellium MATRIX™ automates and accelerates mobile app security testing.
Building Next-Gen Automotive Software: Mastering Mixed Criticality Workloads and Software Test Environments
On Demand

Building Next-Gen Automotive Software: Mastering Mixed Criticality Workloads and Software Test Environments

Join Bill Neifert and Markus Helmling to discover groundbreaking developments in automotive software and how to leverage cloud-based virtual devices to enhance your development methodologies. Watch as Bill and Markus demonstrate mixed-criticality workloads and learn how Vector's SIL Kit and CANoe facilitate the construction of real-world scenarios within a virtual environment.
Arm Tech Talk: Accelerating Software Development for Automotive Solutions
On Demand

Arm Tech Talk: Accelerating Software Development for Automotive Solutions

Join Corellium and Arm on for our Tech Talk, “Accelerating Software Development for Next-Generation Arm-based Automotive Solutions.” This session will explore how Corellium’s virtualization technology is transforming the landscape of automotive software development.
Introducing Corellium’s Automated Mobile App Security Testing
On Demand

Introducing Corellium’s Automated Mobile App Security Testing

Watch the latest Change What’s Possible webinar, “Introducing Corellium’s Automated Mobile App Security Testing,” hosted by Corellium’s Brian Robison and Steven Smiley. Learn about the future of security with Corellium’s latest innovation, automated Mobile App Security Testing (MAST), now integrated into our Virtual Hardware platform. Watch now on demand to see MAST in action.
Experimenting with Messaging App Vulnerabilities
On Demand

Experimenting with Messaging App Vulnerabilities

Join us for our webinar, “Experimenting with Messaging App Vulnerabilities,” hosted by Brian Robison and guest speaker, Marco Chomut of tfp0. Last year we released Corellium Café, our first intentionally vulnerable app. Now we’ve added Corellium GlitchChat, an intentionally vulnerable messaging app for iOS, to the mix. Many current threats target mobile messaging apps, exploiting vulnerabilities in those apps using 0-click methods to steal data or compromise the device. GlitchChat was designed to provide researchers with a safe environment to experiment with 0-click exploits using features provided by Corellium. Watch this webinar to learn how you can use Corellium GlitchChat in your security research work.
Automate Complex Tasks by Giving GPT-4 Control over Corellium’s API
On Demand

Automate Complex Tasks by Giving GPT-4 Control over Corellium’s API

Join Corellium Chief Evangelist, Brian Robison, and guest speaker David Manouchehri from ai.moda, for our first webinar of 2024. In this webinar, we had a little fun by giving GPT-4 control over Corellium’s OpenAPI endpoint to automate complex tasks using plain English! We walked through how to use Corellium’s API with Python, and then used OpenAI’s GPT-4 to instruct Corellium's OpenAPI endpoint to control a Corellium virtual phone. Finally, we showed how to automate this as a daily task using Google Cloud Run.
Accelerating IoT Device Software Development with Corellium
On Demand

Accelerating IoT Device Software Development with Corellium

Discover how Arm device virtualization can accelerate your software development lifecycles in our recent webinar hosted by Bill Neifert, SVP of Partnerships at Corellium, and special guest Eric Sondhi, Director of Marketing at Arm. In our recent discussion, Bill and Eric delved into IoT software development flows and how a scalable, cloud-based methodology sped up DevOps tasks and significantly reduced costs compared to running device farms. Discover how integrations with cloud services such as GitHub Actions and AWS GreenGrass improved how IoT software was developed.
Intro to Custom Device Modeling with Corellium
On Demand

Intro to Custom Device Modeling with Corellium

Developers can use the Corellium CHARM Developer Kit to create custom virtual device models for the Corellium platform.
Hunting for Vulnerabilities in iOS Apps
On Demand

Hunting for Vulnerabilities in iOS Apps

Join Chief Evangelist Brian Robison, Corellium Researcher Steven Smiley, and guest speaker Robert Ferri as they go deeper into reverse engineering tactics and techniques with iOS mobile applications. Learn some of the tools of the trade in decompiling and static code analysis to hunt for vulnerabilities. Additional live demonstrations included using common tools like Burp Suite, Frida and Objection to prove that the vulnerabilities actually exist.
Deep Dive into Reverse Engineering on Android
On Demand

Deep Dive into Reverse Engineering on Android

Join Brian Robison (Chief Evangelist) and Steven Smiley (Corellium Researcher) as they discuss reverse engineering tactics on Android mobile applications. Together, they demonstrated how to find vulnerabilities through decompiling and static code analysis. They also tested common tools of the trade — including Burp Suite, Frida, and Objection — to prove that vulnerabilities exist in data at rest and data in motion.
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2
On Demand

Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2

Learn how to use the Corellium Café mobile app to uncover mobile app vulnerabilities in Corellium’s virtualized environment. Watch our webinar.
Mobile Malware & Threat Research Without Limits
On Demand

Mobile Malware & Threat Research Without Limits

In this webinar, we showed how Corellium’s virtualization platform removes the limitations of using physical devices to perform dynamic analysis on mobile malware, and makes it much safer and more efficient than ever before. We played with live ransomware, spyware, and other types of information-stealers. Then, we examined their effects on devices, while gathering indicators of compromise that we can use to defend our environment. We saw live command and control (C2) communication, as well as malware that destroys user data.
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty
On Demand

Mobile Vulnerabilities Exposed: Getting Our Hands Dirty

In our final episode on mobile application penetration testing, Corellium Researcher Steven Smiley and Chief Evangelist Brian Robison put together many of the tactics from the previous 4 webinars, using mobile app pen testing techniques from earlier episodes in a new mobile app – Corellium Cafe.
Mobile Vulnerabilities Exposed: Reverse Engineering
On Demand

Mobile Vulnerabilities Exposed: Reverse Engineering

In this installment of our Change What’s Possible webinar series, our host, VP of Product Marketing, Brian Robison, and guest speaker Corellium Researcher, Steven Smiley, discuss the most effective ways to find system vulnerabilities on iOS and Android devices through mobile app reverse engineering and static binary analysis.
Mobile Vulnerabilities Exposed: Data in Transit
On Demand

Mobile Vulnerabilities Exposed: Data in Transit

In the third installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data inTransit," VP of Product Marketing, Brian Robison, discussed how to capture network traffic and analyze data in transit.
Mobile Vulnerabilities Exposed: Data at Rest
On Demand

Mobile Vulnerabilities Exposed: Data at Rest

In the second installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data at Rest," our host, VP of Product Marketing, Brian Robison, and Corellium Researcher, Steven Smiley, will discuss where mobile app data is stored on iOS and Android devices, how easily it can be exploited, and the tools you need to avoid these risks.
Corellium 101: Mobile AppSec Testing with Arm Virtualization
On Demand

Corellium 101: Mobile AppSec Testing with Arm Virtualization

In Corellium's webinar series Change What's Possible Episode 1, VP of Product Marketing, Brian Robison will discuss the current limitations to mobile security testing and how Corellium addresses them. The discussion includes live demos of how the Corellium Virtual Hardware platform handles malware research, app pen testing, and OS vulnerability research.